• Sign in
  • Sign up
Elektrine
EN
Log in Register
Modes
Overview Chat Timeline Communities Gallery Lists Friends Email Vault DNS VPN
Back to Timeline
  • Open on lemmy.myserv.one

Kailn

@Kailn@lemmy.myserv.one
lemmy 0.19.17
0 Followers
0 Following
Joined September 26, 2025

Posts

Open post
In reply to
Kailn
@Kailn@lemmy.myserv.one
lemmy.myserv.one
Kailn
Kailn
@Kailn@lemmy.myserv.one
lemmy.myserv.one
@Kailn@lemmy.myserv.one in privacy · Mar 02, 2026
Just… Don’t let them deceive you; If you must use deceitful software like Gmail, Whatsapp, Discord, office or whatever, just try your best not to leak your personal data on them, and if you can hinder the tracking, do so. If you can use other (preferably FOSS) software, do so, there’s plenty of solutions out there and most of them are free, and sometimes selfhost-able. Google, Meta, Microsoft or whatever corp can lie about security or privacy all they want, but in the end, they only fool themself thinking their monetary practices aren’t obvious and they can fool everyone, trust is a hard thing to earn and they can’t earn it with fraud. The product mostly show itself, and you have to go around it to know what’s it’s deal, if you prefer to not do so, you can search if any security researcher or analyst did investigate the product; For example Google claims Chrome browser is “safe” and “secure” dispute them giving so much trackable APIs for websites, and having a horrable default permissions, and don’t forget the “Manifest V3” transition just to remove ads (and trackers) blockers like uBlock Origin. You don’t need solid proof to know what is what. And then you just type " Foss Chrome Alternatives" or “Private Browsers” on a search engine like DDG where you can find many articles to help you find one (like this) and you’d be done. Forget about ““Others”” right now, your well-being matters the most.
View full thread on lemmy.myserv.one
0
0
0
0
Open post
In reply to
Kailn
@Kailn@lemmy.myserv.one
lemmy.myserv.one
Kailn
Kailn
@Kailn@lemmy.myserv.one
lemmy.myserv.one
@Kailn@lemmy.myserv.one in technology · Feb 26, 2026
Peviously posted on an another lemmy community.
View full thread on lemmy.myserv.one
0
0
0
0
Open post
Kailn
@Kailn@lemmy.myserv.one
lemmy.myserv.one
Kailn
Kailn
@Kailn@lemmy.myserv.one
lemmy.myserv.one
@Kailn@lemmy.myserv.one in technology · Feb 26, 2026

Google catches Beijing spies using Sheets to spread espionage across 4 continents

The Chocolate Factory announced the Google Threat Intelligence Group-led actions on Wednesday and said that, in partnership with other teams, it terminated all Google Cloud Projects that had been controlled by UNC2814, a group that GTIG has tracked since 2017. They also disabled all known UNC2814 infrastructure and accounts, and revoked access to the Google Sheets API calls used by the Chinese snoops for command-and-control (C2) purposes. “As of Feb. 18, GTIG’s investigation confirmed that UNC2814 has impacted 53 victims in 42 countries across four continents, and identified suspected infections in at least 20 more countries,” the threat hunters said in the report. The security sleuths uncovered this campaign during a Mandiant investigation into suspicious activity in a customer’s environment. Specifically, this binary, “/var/tmp/xapt,” initiated a shell with root privileges, and then executed a command to retrieve the system’s user and group identifiers to confirm it had successfully escalated to root. Google suspects the payload was named xapt, after the command-line tool in Debian and Ubuntu systems, to make it easier to hide in the victim’s environment and look like a legitimate tool. The intruders also used a novel backdoor, Gridtide, that abuses legitimate Google Sheets API functionality to disguise its command-and-control (C2) traffic. Mandiant has linked Gridtide to UNC2814. The intruders also used a novel backdoor, Gridtide, that abuses legitimate Google Sheets API functionality to disguise its command-and-control (C2) traffic. Mandiant has linked Gridtide to UNC2814. After breaking in, the spies moved laterally via SSH, performed reconnaissance, escalated privileges, and then deployed the Gridtide backdoor using a command, “nohup ./xapt,” that allows it to run even after the user closes the session. “Subsequently, SoftEther VPN Bridge was deployed to establish an outbound encrypted connection to an external IP address,” the threat intel team wrote. "VPN configuration metadata suggests UNC2814 has been leveraging this specific infrastructure since July 2018." The C-based backdoor uses Google Sheets as its C2 platform, can execute shell commands, and can upload and download files. In this case, the attacker deployed Gridtide on an endpoint containing personal information - likely to identify and track persons of interest - including full name, phone number, date and place of birth, voter ID and national ID numbers.
View on lemmy.myserv.one
Google and friends disrupt suspected Beijing espionage op
www.theregister.com

Google and friends disrupt suspected Beijing espionage op

: UNC2814 historically targets governments and telcos

128
27
0
0
313k7r1n3

Company

  • About
  • Contact
  • FAQ

Legal

  • Terms of Service
  • Privacy Policy
  • VPN Policy

Email Settings

IMAP: mail.elektrine.com:993

POP3: pop3.elektrine.com:995

SMTP: mail.elektrine.com:465

SSL/TLS required

Support

  • support@elektrine.com
  • Report Security Issue

Connect

Tor Hidden Service

khav7sdajxu6om3arvglevskg2vwuy7luyjcwfwg6xnkd7qtskr2vhad.onion
© 2026 Elektrine. All rights reserved. • Server: 06:13:36 UTC